Skip to content

Commit b6eb5fc

Browse files
authored
test: reduce parameter selection (#5161)
1 parent ffb6079 commit b6eb5fc

10 files changed

+38
-37
lines changed

tests/integrationv2/configuration.py

+1
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@
6262
Certificates.ECDSA_256,
6363
Certificates.ECDSA_384,
6464
Certificates.RSA_PSS_2048_SHA256,
65+
Certificates.ECDSA_521,
6566
]
6667

6768

tests/integrationv2/test_cross_compatibility.py

+5-5
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
available_ports,
99
ALL_TEST_CIPHERS,
1010
ALL_TEST_CURVES,
11-
ALL_TEST_CERTS,
11+
MINIMAL_TEST_CERTS,
1212
)
1313
from common import ProviderOptions, Protocols, data_bytes
1414
from fixtures import managed_process # noqa: F401
@@ -31,7 +31,7 @@
3131
@pytest.mark.uncollect_if(func=invalid_test_parameters)
3232
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
3333
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
34-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
34+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
3535
@pytest.mark.parametrize("protocol", RESUMPTION_PROTOCOLS, ids=get_parameter_name)
3636
@pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name)
3737
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -104,7 +104,7 @@ def test_s2n_old_server_new_ticket(
104104
@pytest.mark.uncollect_if(func=invalid_test_parameters)
105105
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
106106
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
107-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
107+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
108108
@pytest.mark.parametrize("protocol", RESUMPTION_PROTOCOLS, ids=get_parameter_name)
109109
@pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name)
110110
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -179,7 +179,7 @@ def test_s2n_new_server_old_ticket(
179179
@pytest.mark.uncollect_if(func=invalid_test_parameters)
180180
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
181181
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
182-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
182+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
183183
@pytest.mark.parametrize("protocol", RESUMPTION_PROTOCOLS, ids=get_parameter_name)
184184
@pytest.mark.parametrize("provider", [S2N], ids=get_parameter_name)
185185
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -248,7 +248,7 @@ def test_s2n_old_client_new_ticket(
248248
@pytest.mark.uncollect_if(func=invalid_test_parameters)
249249
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
250250
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
251-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
251+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
252252
@pytest.mark.parametrize("protocol", RESUMPTION_PROTOCOLS, ids=get_parameter_name)
253253
@pytest.mark.parametrize("provider", [S2N], ids=get_parameter_name)
254254
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)

tests/integrationv2/test_dynamic_record_sizes.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
available_ports,
88
ALL_TEST_CIPHERS,
99
ALL_TEST_CURVES,
10-
ALL_TEST_CERTS,
10+
MINIMAL_TEST_CERTS,
1111
PROTOCOLS,
1212
)
1313
from common import ProviderOptions, data_bytes
@@ -57,7 +57,7 @@ def find_fragmented_packet(results):
5757
@pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name)
5858
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
5959
@pytest.mark.parametrize("protocol", PROTOCOLS, ids=get_parameter_name)
60-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
60+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
6161
def test_s2n_client_dynamic_record(
6262
custom_mtu, # noqa: F811
6363
managed_process, # noqa: F811

tests/integrationv2/test_early_data.py

+8-8
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
from configuration import (
88
available_ports,
99
ALL_TEST_CURVES,
10-
ALL_TEST_CERTS,
10+
MINIMAL_TEST_CERTS,
1111
TLS13_CIPHERS,
1212
)
1313
from common import ProviderOptions, Protocols, Curves, data_bytes
@@ -156,7 +156,7 @@ def test_nothing():
156156
@pytest.mark.uncollect_if(func=invalid_test_parameters)
157157
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
158158
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
159-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
159+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
160160
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
161161
@pytest.mark.parametrize("provider", CLIENT_PROVIDERS, ids=get_parameter_name)
162162
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -224,7 +224,7 @@ def test_s2n_server_with_early_data(
224224

225225
@pytest.mark.uncollect_if(func=invalid_test_parameters)
226226
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
227-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
227+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
228228
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
229229
@pytest.mark.parametrize("provider", SERVER_PROVIDERS, ids=get_parameter_name)
230230
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -292,7 +292,7 @@ def test_s2n_client_with_early_data(
292292

293293
@pytest.mark.uncollect_if(func=invalid_test_parameters)
294294
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
295-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
295+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
296296
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
297297
@pytest.mark.parametrize("provider", SERVER_PROVIDERS, ids=get_parameter_name)
298298
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -360,7 +360,7 @@ def test_s2n_client_without_early_data(
360360
@pytest.mark.uncollect_if(func=invalid_test_parameters)
361361
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
362362
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
363-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
363+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
364364
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
365365
@pytest.mark.parametrize("provider", CLIENT_PROVIDERS, ids=get_parameter_name)
366366
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -431,7 +431,7 @@ def test_s2n_server_with_early_data_rejected(
431431
@pytest.mark.uncollect_if(func=invalid_test_parameters)
432432
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
433433
@pytest.mark.parametrize("curve", S2N_HRR_CURVES, ids=get_parameter_name)
434-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
434+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
435435
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
436436
@pytest.mark.parametrize("provider", SERVER_PROVIDERS, ids=get_parameter_name)
437437
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -508,7 +508,7 @@ def test_s2n_client_with_early_data_rejected_via_hrr(
508508
@pytest.mark.uncollect_if(func=invalid_test_parameters)
509509
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
510510
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
511-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
511+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
512512
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
513513
@pytest.mark.parametrize("provider", CLIENT_PROVIDERS, ids=get_parameter_name)
514514
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -576,7 +576,7 @@ def test_s2n_server_with_early_data_rejected_via_hrr(
576576
@pytest.mark.uncollect_if(func=invalid_test_parameters)
577577
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
578578
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
579-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
579+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
580580
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
581581
@pytest.mark.parametrize("provider", CLIENT_PROVIDERS, ids=get_parameter_name)
582582
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)

tests/integrationv2/test_external_psk.py

+3-3
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
available_ports,
77
TLS13_CIPHERS,
88
ALL_TEST_CURVES,
9-
ALL_TEST_CERTS,
9+
MINIMAL_TEST_CERTS,
1010
)
1111
from common import ProviderOptions, Protocols, data_bytes
1212
from fixtures import managed_process # noqa: F401
@@ -33,7 +33,7 @@
3333
PSK_IDENTITY_NO_MATCH_2 = "PSK_IDENTITY_NO_MATCH_2"
3434
PSK_SECRET_NO_MATCH_2 = "c1e29493fd"
3535

36-
ALL_TEST_CERTS_WITH_EMPTY_CERT = ALL_TEST_CERTS + [None]
36+
MINIMAL_TEST_CERTS_WITH_EMPTY_CERT = MINIMAL_TEST_CERTS + [None]
3737
PSK_PROVIDERS = [OpenSSL, S2N]
3838

3939

@@ -291,7 +291,7 @@ def test_s2n_server_multiple_psks(
291291
@pytest.mark.parametrize("psk_identity", PSK_IDENTITY_LIST, ids=get_parameter_name)
292292
@pytest.mark.parametrize("psk_secret", PSK_SECRET_LIST, ids=get_parameter_name)
293293
@pytest.mark.parametrize(
294-
"certificate", ALL_TEST_CERTS_WITH_EMPTY_CERT, ids=get_parameter_name
294+
"certificate", MINIMAL_TEST_CERTS_WITH_EMPTY_CERT, ids=get_parameter_name
295295
)
296296
def test_s2n_server_full_handshake(
297297
managed_process, # noqa: F811

tests/integrationv2/test_hello_retry_requests.py

+4-4
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
available_ports,
99
TLS13_CIPHERS,
1010
ALL_TEST_CURVES,
11-
ALL_TEST_CERTS,
11+
MINIMAL_TEST_CERTS,
1212
)
1313
from common import ProviderOptions, Protocols, data_bytes, Curves
1414
from fixtures import managed_process # noqa: F401
@@ -42,7 +42,7 @@ def test_nothing():
4242
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
4343
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
4444
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
45-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
45+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
4646
def test_hrr_with_s2n_as_client(
4747
managed_process, # noqa: F811
4848
cipher,
@@ -113,7 +113,7 @@ def test_hrr_with_s2n_as_client(
113113
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
114114
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
115115
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
116-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
116+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
117117
def test_hrr_with_s2n_as_server(
118118
managed_process, # noqa: F811
119119
cipher,
@@ -185,7 +185,7 @@ def test_hrr_with_s2n_as_server(
185185
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
186186
@pytest.mark.parametrize("curve", TEST_CURVES, ids=get_parameter_name)
187187
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
188-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
188+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
189189
def test_hrr_with_default_keyshare(
190190
managed_process, # noqa: F811
191191
cipher,

tests/integrationv2/test_session_resumption.py

+7-7
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
available_ports,
1010
ALL_TEST_CIPHERS,
1111
ALL_TEST_CURVES,
12-
ALL_TEST_CERTS,
12+
MINIMAL_TEST_CERTS,
1313
PROTOCOLS,
1414
TLS13_CIPHERS,
1515
)
@@ -27,7 +27,7 @@
2727
@pytest.mark.uncollect_if(func=invalid_test_parameters)
2828
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
2929
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
30-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
30+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
3131
@pytest.mark.parametrize(
3232
"protocol", [p for p in PROTOCOLS if p != Protocols.TLS13], ids=get_parameter_name
3333
)
@@ -89,7 +89,7 @@ def test_session_resumption_s2n_server(
8989
@pytest.mark.uncollect_if(func=invalid_test_parameters)
9090
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
9191
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
92-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
92+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
9393
@pytest.mark.parametrize(
9494
"protocol", [p for p in PROTOCOLS if p != Protocols.TLS13], ids=get_parameter_name
9595
)
@@ -149,7 +149,7 @@ def test_session_resumption_s2n_client(
149149
@pytest.mark.uncollect_if(func=invalid_test_parameters)
150150
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
151151
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
152-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
152+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
153153
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
154154
@pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name)
155155
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -245,7 +245,7 @@ def test_tls13_session_resumption_s2n_server(
245245
@pytest.mark.uncollect_if(func=invalid_test_parameters)
246246
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
247247
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
248-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
248+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
249249
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
250250
@pytest.mark.parametrize("provider", [OpenSSL, S2N], ids=get_parameter_name)
251251
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -327,7 +327,7 @@ def test_tls13_session_resumption_s2n_client(
327327
@pytest.mark.uncollect_if(func=invalid_test_parameters)
328328
@pytest.mark.parametrize("cipher", TLS13_CIPHERS, ids=get_parameter_name)
329329
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
330-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
330+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
331331
@pytest.mark.parametrize("protocol", [Protocols.TLS13], ids=get_parameter_name)
332332
@pytest.mark.parametrize("provider", [OpenSSL], ids=get_parameter_name)
333333
@pytest.mark.parametrize("other_provider", [S2N], ids=get_parameter_name)
@@ -418,7 +418,7 @@ def test_s2nd_falls_back_to_full_connection(
418418
@pytest.mark.uncollect_if(func=invalid_test_parameters)
419419
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
420420
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
421-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
421+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
422422
@pytest.mark.parametrize(
423423
"protocol", [p for p in PROTOCOLS if p < Protocols.TLS13], ids=get_parameter_name
424424
)

tests/integrationv2/test_signature_algorithms.py

+3-3
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
import copy
44
import pytest
55

6-
from configuration import available_ports, ALL_TEST_CIPHERS, ALL_TEST_CERTS
6+
from configuration import available_ports, ALL_TEST_CIPHERS, MINIMAL_TEST_CERTS
77
from common import ProviderOptions, Protocols, Signatures, data_bytes
88
from fixtures import managed_process # noqa: F401
99
from providers import Provider, S2N, OpenSSL, GnuTLS
@@ -87,7 +87,7 @@ def skip_ciphers(*args, **kwargs):
8787
[Protocols.TLS13, Protocols.TLS12, Protocols.TLS11],
8888
ids=get_parameter_name,
8989
)
90-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
90+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
9191
@pytest.mark.parametrize("signature", all_sigs, ids=get_parameter_name)
9292
@pytest.mark.parametrize(
9393
"client_auth",
@@ -169,7 +169,7 @@ def test_s2n_server_signature_algorithms(
169169
[Protocols.TLS13, Protocols.TLS12, Protocols.TLS11],
170170
ids=get_parameter_name,
171171
)
172-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
172+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
173173
@pytest.mark.parametrize("signature", all_sigs, ids=get_parameter_name)
174174
@pytest.mark.parametrize(
175175
"client_auth",

tests/integrationv2/test_sslyze.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
import abc
66
from enum import Enum, auto
77

8-
from configuration import available_ports, ALL_TEST_CERTS
8+
from configuration import available_ports, MINIMAL_TEST_CERTS
99
from common import ProviderOptions, Protocols, Cipher, Ciphers, Curves
1010
from fixtures import managed_process # noqa: F401
1111
from providers import S2N
@@ -35,7 +35,7 @@
3535

3636
CERTS_TO_TEST = [
3737
cert
38-
for cert in ALL_TEST_CERTS
38+
for cert in MINIMAL_TEST_CERTS
3939
if cert.name
4040
not in {
4141
"RSA_PSS_2048_SHA256" # SSLyze errors when given an RSA PSS cert

tests/integrationv2/test_version_negotiation.py

+3-3
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
available_ports,
88
ALL_TEST_CIPHERS,
99
ALL_TEST_CURVES,
10-
ALL_TEST_CERTS,
10+
MINIMAL_TEST_CERTS,
1111
)
1212
from common import ProviderOptions, Protocols, data_bytes
1313
from fixtures import managed_process # noqa: F401
@@ -42,7 +42,7 @@ def invalid_version_negotiation_test_parameters(*args, **kwargs):
4242
@pytest.mark.uncollect_if(func=invalid_version_negotiation_test_parameters)
4343
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
4444
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
45-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
45+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
4646
@pytest.mark.parametrize(
4747
"protocol",
4848
[Protocols.TLS12, Protocols.TLS11, Protocols.TLS10],
@@ -123,7 +123,7 @@ def test_s2nc_tls13_negotiates_tls12(
123123
@pytest.mark.uncollect_if(func=invalid_version_negotiation_test_parameters)
124124
@pytest.mark.parametrize("cipher", ALL_TEST_CIPHERS, ids=get_parameter_name)
125125
@pytest.mark.parametrize("curve", ALL_TEST_CURVES, ids=get_parameter_name)
126-
@pytest.mark.parametrize("certificate", ALL_TEST_CERTS, ids=get_parameter_name)
126+
@pytest.mark.parametrize("certificate", MINIMAL_TEST_CERTS, ids=get_parameter_name)
127127
@pytest.mark.parametrize(
128128
"protocol",
129129
[Protocols.TLS12, Protocols.TLS11, Protocols.TLS10],

0 commit comments

Comments
 (0)